Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
GAO: Cyber data sharing is lacking
Thursday - 8/19/2010, 8:30am EDT
- The federal government is not living up to private sector expectations for cybersecurity information-sharing. That's according to a new GAO report. More than 9-in-10 survey respondents from the defense, banking and other industries say they expect at least moderate amounts of "timely and actionable cyber threat information". But only 27-percent say they've received it. GAO warns that if things don't improve, the owners of critical infrastructure, like power systems, won't have the information they need to stop catastrophic cyber attacks.
- You can learn more about CyberSecurity in Second Life. The CyberWatch organization, an Advanced Technological Education Center funded by the National Science Foundation, is launching a 3D online virtual environment in Second Life to teach members about cybersecurity issues. The so-called island will feature classrooms, meeting spaces, private and public auditoriums, and information about CyberWatch. The group will also use the virtual environment to conduct workshops and presentations to their members and for the public. Second Life users can access the CyberWatch region using this link: maps.secondlife.com/secondlife/CyberWatch/123/50/23
- If you're looking for Cameron Diaz, Julia Roberts or Jessica Biel online, look out! The movie stars top the latest list of the most dangerous celebrities to search for online, according to new research by computer-security software maker McAfee Inc. It's far from an Oscar, but landing atop McAfee's annual list carries a distinction all its own: It means that criminals believe those celebs are the perfect lures to sucker people into visiting malicious websites. Clicking onto strange sites is sketchy to begin with. But many people do, and their computers get infected. Once a computer is infected, criminals can steal victims' online banking passwords, e-mail passwords, and do other kinds of nasty deeds.
Check out all of Federal News Radio's coverage of cybersecurity issues here.